GConferenceGridThe Conference Catalogue · Vol. 2026Folio № 41CD53
Technology

Arizona Digital Government Summit 2026

T

he Arizona Digital Government Summit brings together leaders in state and local government to explore cutting-edge technologies and address the most pressing challenges in the public sector. With a focus on areas like cybersecurity, AI, data governance, and digital service delivery, the summit offers sessions designed to spark insight and foster collaborati…

Visit the official site
13Voices
59Underwriters
28Exhibitors
12On the bill · sessions
69Companies · in total
§I

The Voices

Programmed at Arizona, in alphabetical order.
Dan Wilkins
Chief Information Security Officer, Department of Economic Security, State of Arizona · Department of Economic Security, State of Arizona
Jacque S. Lee
Director of Government Vertical Strategy and Accessibility, T-Mobile · T-Mobile
JR Sloan
Chief Information Officer, State of Arizona · State of Arizona
Kari Johnson
Deputy CIO – Chief Data and Analytics Officer, City of Scottsdale · City of Scottsdale
Lisa Faison
Chief Information Officer, City of Goodyear · City of Goodyear
Lisa Meyerson Marshall
Deputy Chief Information Officer, Department of Administration, Strategic Enterprise Technology Office, State of Arizona · Department of Administration, Strategic Enterprise Technology Office, State of Arizona
Mark Darmer
Chief Information Officer, Department of Economic Security, State of Arizona · Department of Economic Security, State of Arizona
Robert Ochoa
Practice Director - Cyber Security, ANM · ANM
Scott Sailer
Senior Account Director, Specialized Sales, Lumen · Lumen
Shawnee Delaney
CEO, Vaillance Group and Former Spy · Vaillance Group
Shyrene Gray
Director, Records Management, Department of Education, State of Arizona · Department of Education, State of Arizona
Thomas Szewczyk
Application Developer, Department of Emergency and Military, State of Arizona · Department of Emergency and Military, State of Arizona
Tim Howell
Government Strategy and Solutions · NinjaOne
§II

Underwritten By

The houses behind the program. Tiers as disclosed.
Abnormal AI, Inc. | WizExhibitor Sponsor
Accenture LLPPatron Plus Sponsor
ANMAnchor Sponsor
AppianPatron Plus Sponsor
Arctiq | DynatraceExhibitor Sponsor
ArmisExhibitor Sponsor
Black DuckPatron Sponsor
C3 NetworksPatron Plus Sponsor
CGIKeynote Impact Sponsor
CiscoExhibitor Sponsor
Comcast BusinessExhibitor Sponsor
CourseraPatron Sponsor
DatadogExhibitor Sponsor
DeloitteNotebook Sponsor
Docusign, Inc.Patron Sponsor
EatonExhibitor Sponsor
Ednetics MGT | HPEExhibitor Sponsor
Everpure | CommvaultExhibitor Sponsor
EYPatron Plus Sponsor
F5Patron Sponsor
FortinetExhibitor Sponsor
GartnerKeynote Impact Sponsor
GigamonPatron Sponsor
GMIHeadshots & Highlights Booth Sponsor
IBMRoundtable Breakfast/Anchor Sponsor
Info-Tech Research GroupExhibitor Sponsor
Insight Public Sector | GoogleAnchor Sponsor
In Time TecPatron Plus Sponsor
KyndrylAnchor Sponsor
LullabotPatron Plus Sponsor
Lumen | CienaAnchor Sponsor
MaximusPatron Plus Sponsor
Milestone Computer Technology, Inc.Exhibitor Sponsor
Monday.comExhibitor Sponsor
NavaPatron Plus Sponsor
NetskopePatron Plus Sponsor
NinjaOneAnchor Sponsor
OmnissaExhibitor Sponsor
PluralsightPatron Sponsor
QualysExhibitor Sponsor
§III

The Programme

Selected from 12 sessions on the bill.
  • Thursday, May 21, 10:45 am Mountain no DST

    Living with Shadow IT: Governing the Tools You Can’t See!

    Government employees today have access to more technology than ever before, and many are using tools outside official IT environments to get their work done faster and more effecti…

    Concurrent Sessions
  • Thursday, May 21, 10:45 am Mountain no DST

    Managing the Data Lifecycle: Governance, Retention, and Smart Storage

    Governments are managing more data than ever, creating challenges around governance, compliance, and cost. This session explores how agencies are taking a strategic approach to dat…

    Concurrent Sessions
  • Thursday, May 21, 10:45 am Mountain no DST

    Reducing Technical Debt in the Modern Age

    Modernization and technical debt remediation are central to delivering faster and more reliable public services. How can agencies accelerate updates while separating hype from the …

    Concurrent Sessions
  • Thursday, May 21, 10:45 am Mountain no DST

    Using AI to Stay Ahead of Threat Actors

    As threat actors become more sophisticated, government agencies are increasingly turning to AI to strengthen their cybersecurity posture. From threat detection and anomaly monitori…

    Concurrent Sessions
  • Thursday, May 21, 12:45 pm Mountain no DST

    Bits and Bytes

  • Thursday, May 21, 1:30 pm Mountain no DST

    Beyond Compliance: Accessibility, Liability, and Human-Centered Digital Services

    With the Department of Justice’s updated ADA Title II rule extending compliance timelines into 2027, state and local governments are navigating evolving expectations for digital ac…

    Concurrent Sessions
  • Thursday, May 21, 1:30 pm Mountain no DST

    Exclusive Briefing for Industry Partners

  • Thursday, May 21, 1:30 pm Mountain no DST

    Future-Proofing IT: Strategies for Resilience and Continuity

    In today’s unpredictable world, the continued operation of government services in a disaster is critical, the safeguarding of digital infrastructure and data has never been more im…

    Concurrent Sessions
  • Thursday, May 21, 1:30 pm Mountain no DST

    When Nothing Bad Happens: Telling the Story Behind Cyber Defense

    Cybersecurity teams work every day to prevent breaches and protect critical systems, but much of that work happens behind the scenes. When attacks are stopped or vulnerabilities ar…

    Concurrent Sessions
Intermission
Part the Second · For the Buyer

What does it mean when 69 companies show up — and 30 bet on three roles at once?

69 companies. 30 are betting more than once.

The numbers below are derived from the speakers, sponsors, and exhibitors on this page — cross-referenced into one ledger. They are the only thing here that 10times.com cannot tell you.

01Fig. 01 — Composition of the House
30All threespeak · spons · exh
29Sponsoringsponsor only
0Exhibitingexhibitor only
10Speakingspeaker only

The Triple-Threat

Abnormal AI, Inc. | Wiz·Arctiq | Dynatrace·Armis·Cisco·Comcast Business·Datadog·Eaton·Ednetics MGT | HPE·Everpure | Commvault·Fortinet·Info-Tech Research Group·Milestone Computer Technology, Inc.·Monday.com·Omnissa·Qualys·Rubrik | Zscaler·Salesforce·Samsara·Semperis | Cohesity·Siteimprove·Slalom·Snowflake Inc.

02Fig. 02 — The Voices, by Seniority

85% of the speakers carry senior titles — C-suite, Founder, VP, or Director-level.

  • C-suite754%
  • Director / Head of431%
  • Engineer · IC18%
  • Other roles18%

Of 13 on the bill · classified by free-text title

03Fig. 03 — The Heaviest in the Room
  1. 01Abnormal AI, Inc. | WizSp·EEx
  2. 02Arctiq | DynatraceSp·EEx
  3. 03ArmisSp·EEx
  4. 04CiscoSp·EEx
  5. 05Comcast BusinessSp·EEx
  6. 06DatadogSp·EEx
  7. 07EatonSp·EEx
  8. 08Ednetics MGT | HPESp·EEx
  9. 09Everpure | CommvaultSp·EEx
  10. 10FortinetSp·EEx
  11. 11Info-Tech Research GroupSp·EEx
  12. 12Milestone Computer Technology, Inc.Sp·EEx
  13. 13Monday.comSp·EEx
  14. 14OmnissaSp·EEx
04Fig. 04 — By Tier
anchor sponsor7
12% of 59
exhibitor sponsor28
47% of 59
headshots & highlights booth sponsor1
2% of 59
keynote impact sponsor3
5% of 59
notebook sponsor1
2% of 59
patron plus sponsor9
15% of 59
patron sponsor8
14% of 59
recharge break sponsor1
2% of 59
roundtable breakfast/anchor sponsor1
2% of 59
05Fig. 05 — The Missing · who's at peer events but not here

These companies sponsored two or more peer events recently, but aren't on this program. For an organizer, that's a list of warm prospects.

06Fig. 06 — Adjacent Convocations · by shared underwriters